DocumentCode :
2276546
Title :
A lightweight secure cyber foraging infrastructure for resource-constrained devices
Author :
Goyal, Sachin ; Carter, John
Author_Institution :
Sch. of Comput., Utah Univ., USA
fYear :
2004
fDate :
2-3 Dec. 2004
Firstpage :
186
Lastpage :
195
Abstract :
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resource-constrained surrogate machines, enables new and interesting applications for these devices. In this paper, we describe a surrogate infrastructure based on virtual machine technology that allows resource-constrained devices to utilize a surrogate´s compute, network, and storage resources. After describing the design of our surrogate infrastructure, we demonstrate how it can be used to support real-time speech recognition and a synthetic Web services application. Using a surrogate reduces the response time of speech recognition by a factor of 200 while reducing the energy drain on the client device by a factor of 60. Using a surrogate reduces the response time and energy drain on the client by factors of 21 and 25, respectively, for the Web services application.
Keywords :
Internet; mobile computing; resource allocation; security of data; speech recognition; storage allocation; virtual machines; resource-constrained embedded devices; resource-constrained mobile devices; secure cyber foraging infrastructure; speech recognition; storage resources; synthetic Web services; virtual machine; Application software; Computer networks; Delay; Embedded computing; Mobile computing; Personal digital assistants; Pervasive computing; Speech recognition; Virtual machining; Web services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Computing Systems and Applications, 2004. WMCSA 2004. Sixth IEEE Workshop on
ISSN :
1550-6193
Print_ISBN :
0-7695-2258-0
Type :
conf
DOI :
10.1109/MCSA.2004.2
Filename :
1377327
Link To Document :
بازگشت